US10848642B2 - Apparatus for generating trusted image data, an apparatus for authentication of an image and a method for generating trusted image data - Google Patents
Apparatus for generating trusted image data, an apparatus for authentication of an image and a method for generating trusted image data Download PDFInfo
- Publication number
- US10848642B2 US10848642B2 US13/865,362 US201313865362A US10848642B2 US 10848642 B2 US10848642 B2 US 10848642B2 US 201313865362 A US201313865362 A US 201313865362A US 10848642 B2 US10848642 B2 US 10848642B2
- Authority
- US
- United States
- Prior art keywords
- data
- image
- image data
- camera
- time
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related, expires
Links
- 238000000034 method Methods 0.000 title description 22
- 230000001360 synchronised effect Effects 0.000 claims description 19
- 230000015654 memory Effects 0.000 claims description 8
- 238000010586 diagram Methods 0.000 description 14
- 230000000875 corresponding effect Effects 0.000 description 11
- 230000006870 function Effects 0.000 description 11
- 230000004075 alteration Effects 0.000 description 7
- 238000003384 imaging method Methods 0.000 description 5
- 230000001419 dependent effect Effects 0.000 description 4
- 238000004590 computer program Methods 0.000 description 3
- 238000013500 data storage Methods 0.000 description 3
- 238000005259 measurement Methods 0.000 description 3
- 238000003491 array Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 229920000954 Polyglycolide Polymers 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 230000002596 correlated effect Effects 0.000 description 1
- 230000001186 cumulative effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000007620 mathematical function Methods 0.000 description 1
- 229910044991 metal oxide Inorganic materials 0.000 description 1
- 150000004706 metal oxides Chemical class 0.000 description 1
- 229920000747 poly(lactic acid) Polymers 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 235000010409 propane-1,2-diol alginate Nutrition 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/44—Secrecy systems
- H04N1/448—Rendering the image unintelligible, e.g. scrambling
- H04N1/4486—Rendering the image unintelligible, e.g. scrambling using digital data encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32128—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title attached to the image data, e.g. file header, transmitted message header, information on the same page or in the same computer file as the image
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3233—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
- H04N2201/3236—Details of authentication information generation
- H04N2201/3238—Details of authentication information generation using a coded or compressed version of the image data itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3245—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of image modifying data, e.g. handwritten addenda, highlights or augmented reality information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3252—Image capture parameters, e.g. resolution, illumination conditions, orientation of the image capture device
Definitions
- Embodiments relate to the field of trustworthy image generation and in particular to an apparatus for generating trusted image data, an apparatus for authentication of an image and a method for generating trusted image data.
- An embodiment relates to an apparatus for generating trusted image data comprising an image data generator, a processor and an output unit.
- the image data generator is configured to generate image data of an image to be taken of a three-dimensional scene and trust data of the three-dimensional scene.
- the trust data indicates a depth information of at least one pixel of the image to be taken or comprises data capable of being used to calculate a depth information of at least one pixel of the image to be taken.
- the processor is configured to generate encrypted image data by encrypting at least the trust data or characteristic data derivable from at least the trust data, so that an authentication of the image data is enabled based on the encrypted image data.
- the output unit is configured to provide trusted image data comprising the encrypted image data.
- the described concept uses data indicating depth information of the image to be taken in order to increase the trustworthiness of the image data.
- the depth information or data capable of being used to calculate depth information is taken from the same three-dimensional scene as the image data itself. Since the encrypted image data contains an indication on this depth information, the image data can be authenticated based on the encrypted image data. In this way, images taken from manipulated and printed two-dimensional images of three-dimensional photograph scenes can be distinguished from pictures taken from the three-dimensional scene itself. Therefore, the reliability and trustworthiness of the generated trusted image data can be increased. Therefore, such trusted image data may be useable as courtroom evidence.
- Some embodiments further comprise a position determiner configured to determine a position of the apparatus and enable an addition of position data indicating the determined position to the trust data.
- the apparatus may comprise an internal clock configured to enable to add time data and/or position confidence data to the trust data.
- the time data indicates a time
- the position of the apparatus was determined by the position determiner at last
- the position confidence data indicates a confidence level of the determined position based on the time data. In this way, the reliability and trustworthiness of the generated trusted image data can be further improved.
- the apparatus comprises an internal clock configured to enable to add time data indicating a time, the images taken, to the trust data.
- the apparatus may comprise a receiver configured to receive a clock synchronization signal from an external clock.
- the internal clock may be configured to be synchronized with the external clock based on the clock synchronization signal.
- the internal clock may be further configured to enable to add synchronization data and/or time confidence data to the trust data.
- the synchronization data indicates a time, the time of the internal clock was synchronized at last, and/or the time confidence data indicates a confidence level of the time data based on the synchronization data. In this way, the reliability and trustworthiness of the generated trusted image data can be further increased.
- Some embodiments relate to an apparatus for generating trusted image data comprising an image data generator, a position determiner, an internal clock, a processor and an output unit.
- the image data generator is configured to generate image data of an image to be taken from a scene and the position determiner is configured to determine a position of the apparatus and provide trust data indicating the determined position.
- the internal clock is configured to enable to add time data or position confidence data to the trust data. The time data indicates a time, the position of the apparatus was determined by the position determiner at last, or the position confidence data indicates a confidence level of the determined position based on the time data.
- the processor is configured to generate encrypted image data by encrypting at least the trust data or characteristic data derivable from at least the trust data, so that an authentication of the image data is enabled based on the encrypted image data.
- the output unit is configured to provide trusted image data comprising the encrypted image data.
- Some further embodiments relate to an apparatus for generating trusted image data comprising an image data generator, an internal clock, a receiver, a processor and an output unit.
- the image data generator is configured to generate image data of an image to be taken from a scene and the internal clock is configured to provide trust data representing time data indicating a time, the image is taken.
- the receiver is configured to receive a clock synchronization signal from an external clock.
- the internal clock is configured to be synchronized with the external clock based on the clock synchronization signal. Further, the internal clock is configured to enable to add synchronization data or time confidence data to the trust data.
- the synchronization data indicates a time, the time of the internal clock was synchronized at last, or the time confidence data indicates a confidence level of the time data based on the synchronization data.
- the processor is configured to generate encrypted image data by encrypting at least the trust data or characteristic data derivable from at least the trust data so that an authentication of the image data is enabled based on the encrypted image data.
- the output unit is configured to provide trusted image data comprising the encrypted image data.
- the processor is configured to decrypt the encrypted image data to obtain image data of the image to be authenticated generated at the time it was taken, original trust data of the image to be authenticated generated at the time it was taken or characteristic data derived from the image data of the image to be authenticated generated at the time it was taken and original trust data of the image to be authenticated generated at the time it was taken.
- the original trust data comprises a depth information of at least one pixel of the image to be authenticated generated at the time it was taken or comprises data capable of being used to calculate a depth information of at least one pixel of the image to be authenticated generated at the time it was taken.
- the comparison unit is configured to compare the image data of the image to be authenticated with the image data of the encrypted image, the current trust data with the original trust data or the characteristic data contained by the current trust data with the encrypted characteristic data.
- the apparatus is able to identify manipulations or alterations of the image data of an image to be authenticated. For example, images taken from a two-dimensional printout of a three-dimensional scene can be distinguished from images taken from the three-dimensional scene itself due to the depth information.
- FIG. 1 shows a block diagram of an apparatus for generating trusted image data
- FIG. 2 shows a block diagram of another apparatus for generating trusted image data
- FIG. 3 shows a block diagram of another apparatus for generating trusted image data
- FIG. 4 shows a block diagram of another apparatus for generating trusted image data
- FIG. 5 shows a block diagram of an apparatus for an authentication of an image
- FIG. 6 shows a schematic illustration of an image fake protection
- FIG. 7 shows a flow diagram of a method for generating trusted image data.
- FIG. 1 shows a block diagram of an apparatus 100 for generating trusted image data 132 according to an embodiment.
- the apparatus 100 comprises an image data generator 110 connected to a processor 120 and an output unit 130 connected to the processor 120 .
- the image data generator 110 generates image data 112 of an image to be taken of a three-dimensional scene and trust data 114 of the three-dimensional scene.
- the trust data 114 indicates a depth information of at least one pixel of the image to be taken or comprises data capable of being used to calculate a depth information of at least one pixel of the image to be taken.
- the processor 120 generates encrypted image data 122 by encrypting at least the trust data 114 or characteristic data derivable from at least the trust data 114 , so that an authentication of the image data 112 is enabled based on the encrypted image data 122 .
- the output unit 130 provides trusted image data 132 comprising the encrypted image data 122 .
- the described apparatus 100 uses data indicating depth information of the image to be taken in order to increase the trustworthiness of the image data.
- the depth information or data capable of being used to calculate depth information is taken from the same real or actual three-dimensional scene as the image data 112 itself. Since the encrypted image data 122 contains an indication on this depth information, the image data 112 can be authenticated based on the encrypted image data 122 . In this way, images taken from manipulated and printed two-dimensional images of three-dimensional photograph scenes can be distinguished from pictures taken from the three-dimensional scene itself. Therefore, the reliability and trustworthiness of the generated trusted image data 132 can be increased. Therefore, such trusted image data 132 may be useable as courtroom evidence.
- the image data generator 110 may generate the image data 112 and the trust data 114 in various ways.
- the image data generator 110 may comprise a camera for taking images of a three-dimensional scene (e.g. CCD, Charge Coupled Device, CMOS, Complementary Metal Oxide Semiconductor device, or ToF, Time-of-Flight Sensor).
- the image data may comprise information on each pixel of the sensor of the camera of the image data generator 110 or may comprise compressed information (e.g. JPEG or TIFF format) of the pixels of the sensor of the image data generator. Independent from the data format, the image data represents an image taken from a three-dimensional scene.
- a pixel of an image may correspond to a light sensitive cell of a cell array of a sensor of a camera or a smallest or predefined individual entity of an image, for example.
- additional data is obtained in terms of the trust data of the three-dimensional scene to enable an authentication of the image data (e.g. to detect manipulations of the image data).
- the image data generator 110 may generate depth information of the three-dimensional scene, the image is taken from.
- This depth information can be obtained in various ways. For example, the distances to one or more objects of the three-dimensional scene are measured and assigned to corresponding pixels of the taken image or to corresponding parts of the taken image. Alternatively or additionally, an individual depth information is obtained for a plurality of pixels of the taken image or for all pixels of the taken image (e.g. by a Time-of-Flight camera). Alternatively or optionally, the depth information may comprise an average depth measured between objects of the three-dimensional scene and the apparatus 100 or may be obtained for a plurality of pixels or all pixels of the taken image.
- a stereoscopic camera takes two images from different view angles of the same three-dimensional scene.
- the second image data is capable of being used to calculate a depth information of at least pixel of the first taken image in combination with the image data of the first image.
- the distance to objects of the three-dimensional scene can be measured by a measurement unit located near the apparatus. Then, a depth information of at least one pixel, a plurality of pixels or all pixels of the taken image or of a part or a plurality of parts of the taken image can be calculated, if the distance between the measurement unit and the apparatus 100 is known.
- the measurement unit may be part of the image data generator 110 or an external unit connectable to the image data generator 110 (e.g. wireless or wired).
- the depth information may be a relative depth between different objects of the three-dimensional scene or may be an absolute depth between an object of the three-dimensional scene and the apparatus 100 .
- the trust data 140 may comprise absolute depth information of at least one pixel of the image to be taken or comprises data capable of being used to calculate absolute depth information of at least one pixel of the image to be taken, for example.
- the three-dimensional scene may be an arbitrary environment, a trusted image should be taken from (e.g. photographic evidence image of an accident).
- the image data generator 110 may comprise a Time-of-Flight camera, for example.
- This Time-of-Flight camera may generate two dimensional image data 112 (e.g. raw or compressed data) of the image to be taken and trust data 114 indicating depth information for a plurality of pixels or each pixel of the image to be taken.
- image data 112 and the trust data 114 can be generated quickly and reliably.
- the image data generator may comprise a 3D-depth sensor system based on structured-light principle.
- the image generator 110 may comprise a stereoscopic camera, for example.
- This stereoscopic camera may generate image data 112 of a first image to be taken of the three-dimensional scene and image data of a second image to be taken of the three-dimensional scene. These two images are taken from different view angles.
- At least a part of the image data of the second image may be used as trust data 114 , since the image data of the second image or at least a part of this image data is suitable or can be used for calculating a depth information of at least one pixel of the image to be taken.
- at least a part of the image data of the second image represents data capable of being used to calculate a depth information of at least one pixel of the image to be taken.
- the two images provide the possibility of reproducing the three-dimensional image of a three-dimensional scene by a display for an observer or user.
- the described concept may work with any type of 2D and 3D image-sensor variants or principles.
- it may be independent of the used sensor technology, as long as at least an information on a 2D and 3D representation of the scene may be recorded (e.g. at the same time or nearly the same time).
- the processor 120 encrypts at least the trust data 114 or characteristic data derivable from at least the trust data 114 .
- the encryption can be done in various ways (e.g. by using a symmetric or asymmetric encryption algorithm). A manipulation of at least the encrypted data 132 after encrypting can be avoided as far as the used encryption algorithm is secure or reliable.
- the trust data 114 or characteristic data derivable from the trust data 114 may be sufficient to encrypt the trust data 114 or characteristic data derivable from the trust data 114 , since the depth information contained by the trust data 114 may not fit to image data of a taken image, if the image data was altered or manipulated. Additionally, also the image data or characteristic data derivable from the image data may be optionally encrypted for generating the encrypted image data. In this way, also the original image data can be reproduced by decrypting the encrypted image data 122 , so that the manipulation or alteration of image data can be discovered by a comparison with the decrypted image data.
- the processor 120 may encrypt the trust data 114 or the image data 112 and the trust data 114 itself or may calculate characteristic data derivable from the trust data 114 or derivable from the image data 112 and the trust data 114 .
- characteristic data the amount of data of the encrypted image data may be significantly reduced.
- the processor 120 may generate characteristic data derivable from the image data 122 and/or the trust data 114 by calculating hash data based on the image data 112 and/or the trust data 114 .
- the processor 120 may apply a suitable hash function to the image data 112 and/or the trust data 114 .
- a hash is a mathematical function which maps values from a large domain into a smaller range.
- An example may be a hash algorithm dividing a binary file (e.g. image data and/or trust data) into a collection of smaller pieces and performing a cumulative exclusive OR function between successive pieces, producing a hash that is smaller than the original file yet is practically unique to it. Changing a single bit in the original message may produce a very different hash output and reverse engineering a message so it will have a given hash value and also make sense to the reader may be virtually impossible.
- This characteristic data can be encrypted by the processor 120 to obtain a digital signature of the trust data 114 and/or the image data 112 of the image to be taken, for example.
- the processor 120 may use an asymmetric encryption algorithm to encrypt and/or digitally sign at least the trust data 114 or characteristic data derivable from at least the trust data 114 (e.g. public key encryption, elliptic curve cryptography, Rivest-Shamir-Adleman-Encryption).
- an asymmetric encryption algorithm to encrypt and/or digitally sign at least the trust data 114 or characteristic data derivable from at least the trust data 114 (e.g. public key encryption, elliptic curve cryptography, Rivest-Shamir-Adleman-Encryption).
- the apparatus 100 or the processor 120 itself may optionally comprise a memory unit configured to store a private key of an encryption algorithm used by the processor 120 for generating the encrypted and/or digitally signed image data 122 .
- the trust data 114 and/or the image data 112 and the trust data 114 or the characteristic data can be encrypted by using the private key.
- the obtained encrypted image data 122 can be used for authenticating the image data later on.
- the public key can be used to decrypt the encrypted image data 122 .
- This decrypted image data can be compared to the image data to be authenticated or data derived from the image data to be authenticated. In this way, manipulations or alterations of the image data can be identified.
- the output unit 130 may provide trusted image data 132 comprising the encrypted image data 122 .
- the encrypted image data 122 can be used for an authentication of the image data 122 of a taken image.
- the output unit 130 may provide the encrypted image data 122 in a format readable by an apparatus for authentication.
- the encrypted image data 132 may be provided to a memory unit to be stored for later use.
- the output unit 114 may provide optionally the image data 112 of a taken image of a three-dimensional scene and/or trust data 114 of the three-dimensional scene.
- the image data 112 of the taken image and/or the trust data 114 of the taken image can be stored by a memory unit or displayed by a display unit. Later on, a manipulation or alteration of the provided image data 112 and/or trust data 114 may be identified by using the encrypted image data 122 .
- the output unit 130 may be an output interface of the processor 120 or a memory unit configured to store data provided by the processor 120 and may provide stored data, for example.
- the image data generator 110 may comprise a camera.
- This camera may generate the image data 112 of the image to be taken and trust data 114 indicating depth information for at least one pixel, for a plurality of pixels or for each pixel of the image to be taken and at least one parameter of the camera.
- the parameter of the camera may enable a computation of absolute depth information (e.g. distance between the camera and an object of the three-dimensional scene) of at least one pixel of the image to be taken.
- a camera may comprise several adjustment possibilities to vary properties of the camera (e.g. view angle or magnification).
- Such parameters e.g.
- focus, lens parameter, magnification, aperture or modulation parameters for Time-of-Flight cameras may be used for calculating an absolute distance between the camera and an object of a three-dimensional scene, the image is taken from.
- an absolute depth information can be calculated based on the encrypted image data 122 to verify a depth information of the image to be authenticated.
- the apparatus 100 may further comprise one or more additional sensors comprising a compass or a three-dimensional angle sensor, for example.
- additional sensors comprising a compass or a three-dimensional angle sensor, for example.
- Such a sensor may determine additional orientation data indicating an orientation of the apparatus 100 , for example.
- This additional data may be added to the trust data 114 in order to further improve the reliability or trustworthiness of the encrypted image data.
- the apparatus 100 may further comprise a position determiner.
- the position determiner may determine a position of the apparatus 100 and enable an addition of position data indicating the determined position to the trust data 114 .
- the apparatus 100 may add geographic information of the position of the apparatus 100 at the time an image is taken or a last-known position of the apparatus 100 to the trust data 114 . In this way, it may be verified that the apparatus 100 was in the proximity of the three-dimensional scene of the image to be taken at the time the image was taken. Therefore, the trustworthiness or reliability of the authentication of the image can be improved.
- the apparatus 100 may comprise an optional internal clock.
- This internal clock may enable (e.g. provide or add directly) to add time data or position confidence data to the trust data 114 .
- the time data indicates a time
- the position of the apparatus was determined by the position determiner at last (e.g. before the image was taken), or the position confidence data indicates a confidence level of the determined position based on the time data.
- the position determiner may determine the position of the apparatus 100 repeatedly.
- the internal clock may provide time data indicating the time of determining the position of the apparatus 100 .
- This time data can be added to the trust data 114 , so that it can be verified that the camera 100 was near the three-dimensional scene on the image at the time or close to the time the image was taken.
- the position determiner may not be able to determine the position of the apparatus 100 every time or at the time the image is taken (e.g. connection to navigation satellites or navigation network is lost or the power supply is low).
- the time, the position of the apparatus 100 was determined lastly may be a long time before the image was taken. Therefore, the reliability of the position of the apparatus 100 is lower than a position determined at the time the image is taken. So, position confidence data can be added to the trust data 114 which indicates a confidence level of the determined position.
- the confidence level may be a parameter which is low for a position determined long before the image was taken and is high for a position determined at the time the image was taken. In this way, the reliability or trustworthiness of the trusted image data 132 can be increased.
- the internal clock may be configured so that a user manipulation of the time determined or generated by the internal clock can be avoided.
- the apparatus 100 may comprise an internal clock configured to enable (e.g. to provide or to add directly) to add time data indicating a time, the image is taken, to the trust data 114 .
- the time an image is taken may be determined by an internal clock and may be part of the trust data 114 .
- the time, the image was taken can be verified based on the encrypted image data containing information of the time data 122 provided or added by the internal clock. In this way, the reliability or trustworthiness of the trusted image data 132 can be increased.
- an additional parameter may be added to the trusted meta-data (trust data), representing both, the 2D and 3D sample time-stamps separately (or the time-difference as a parameter).
- the apparatus 100 may comprise an internal clock configured to enable (e.g. to provide or to add directly) to add time data indicating a time, the image is taken and a time the depth information of the at least one pixel of the image to be taken or the image is taken and the data capable of being used to calculate the depth information of the at least one pixel of the image to be taken is generated, to the trust data 114 .
- an internal clock configured to enable (e.g. to provide or to add directly) to add time data indicating a time, the image is taken and a time the depth information of the at least one pixel of the image to be taken or the image is taken and the data capable of being used to calculate the depth information of the at least one pixel of the image to be taken is generated, to the trust data 114 .
- a camera technology can be used which is able to record 2D and 3D at almost the same time.
- the apparatus 100 may comprise an optional receiver.
- This receiver may receive a clock synchronization signal from an external clock (e.g. DCF77, Mobile Provider or NTP, Network Time Protocol or GPS-time-signal, global positioning system time signal).
- the internal clock may be synchronized with the external clock based on the clock synchronization signal. In this way, accurate time data may be provided by the internal clock.
- the internal clock may enable (e.g. provide or add) to add synchronization data or time confidence data to the trust data 114 .
- the synchronization data may indicate the time, the time of the internal clock was synchronized at last (e.g. before the image was taken).
- the time confidence data may indicate a confidence level of the time data based on the synchronization data.
- the internal clock may be synchronized with the external clock repeatedly. Each time the internal clock is synchronized, the internal clock may provide time data indicating the time of synchronization. This time data can be added to the trust data 114 , so that it can be verified that the image was taken at the indicated time. However, the internal clock may not be able to be synchronized every time or at the time the image is taken (e.g. connection to external clock is lost or the power supply is low). In this case, the time, the synchronization was done lastly, may be a long time before the image was taken. Therefore, the reliability of the time data indicating the time, the image was taken, is lower than time data of a clock synchronized at the time, the image is taken.
- time confidence data can be added to the trust data 114 which indicates a confidence level of the time data.
- the confidence level may be a parameter which is low for a synchronization done long before the image was taken and is high for a synchronization done at the time the image was taken. In this way, the reliability or trustworthiness of the trusted image data 132 can be increased.
- the image data generator 110 , the processor 120 , the output unit 130 , the internal clock, the position determiner and/or the receiver may be independent hardware units or part of a processor, a microcontroller or a digital signal processor as well as a computer program or software product suitable for providing the corresponding functionality.
- FIG. 2 shows a block diagram of an apparatus 200 for generating trusted image data according to an embodiment.
- the apparatus 200 may comprise an image data generator with a 2D-image-unit 210 (e.g. CCD, CMOS or ToF) and/or a 3D-image-unit 211 (e.g. ToF or stereo-cam).
- the 2D-image-unit 210 may provide image data represented by 2D-pixel-image-data 212 (two-dimensional) of a 3D scene 202 (three-dimensional) to be documented to a processor 220 .
- the 3D-image-unit 211 may provide trust data represented by absolute depth information data 214 (corresponding to 2D-image) to the processor 220 .
- the processor 220 may be a microcontroller (g-controller) including an asymmetric encryption/signation unit (e.g. RSA, PKI). Further, an internal real-time clock 240 may be connected to the processor 220 and may provide time data representing or indicating a time an image is taken to that processor 220 as an addition to the trust data 214 . Further, the apparatus 200 may comprise a GPS-receiver 250 (global positioning system), which may provide GPS coordinates of the apparatus to the processor 220 as an addition to the trust data 214 .
- g-controller microcontroller
- an asymmetric encryption/signation unit e.g. RSA, PKI
- an internal real-time clock 240 may be connected to the processor 220 and may provide time data representing or indicating a time an image is taken to that processor 220 as an addition to the trust data 214 .
- the apparatus 200 may comprise a GPS-receiver 250 (global positioning system), which may provide GPS coordinates of the apparatus to the processor 220 as an
- the GPS receiver 250 may provide a time synchronization signal to the internal real-time clock 240 at the time, the position of the apparatus is determined and the internal real-time clock 240 may provide time data indicating a time, the position was determined, to the processor 220 as an addition to the trust data 214 .
- the apparatus 200 may comprise a receiver 260 for a radio-controlled clock (e.g. DCF 77 ), a mobile provider or an NTP clock receiver, which provides a time synchronization signal to the internal real-time clock 240 . Based on this time synchronization signal, the internal real-time clock 240 may be synchronized with an external clock. Further, the internal real-time clock 240 may provide time data indicating a time of the last time synchronization to the processor 220 as an addition to the trust data 214 .
- a radio-controlled clock e.g. DCF 77
- a mobile provider or an NTP clock receiver which provides a time synchronization signal to the internal real-time clock 240 .
- the processor 220 may generate encrypted image data 222 by encrypting images (e.g. two-dimensional or three-dimensional image data) and meta-data (e.g. the trust data, time data, position data, position confidence data, synchronization data and/or time confidence data).
- the apparatus 200 may further comprise an output unit 230 with encrypted or signed data storage for storing image data representing a 2D-image or a 3D-image (e.g. relative depth information per pixel) and/or meta-data representing parameters to compute absolute depth of image (e.g. focus or lens parameters or used modulation parameters for ToF cams), a time stamp, a confidence level of time stamp (e.g. last time of time resynch), optional GPS coordinates including confidence data (e.g. last time of resynch) and/or additional data of further optional sensors (e.g. compass or 3D-angle sensor). Further, the output unit 230 may provide the image data and/or meta-data.
- images e.g. two-dimensional or three
- FIG. 3 shows a block diagram of an apparatus 300 for generating trusted image data 332 according to an embodiment.
- the apparatus 300 comprises an image data generator 310 , a processor 320 , an output unit 330 , a position determiner 340 and an internal clock 350 .
- the image data generator 310 , the position determiner 340 and the internal clock 350 are connected to the processor 320 .
- the processor 320 is connected to the output unit 330 .
- the image data generator 310 may generate image data 312 of an image to be taken from a scene (e.g. two-dimensional or three-dimensional scene).
- the position determiner 340 determines a position of the apparatus 300 and provides trust data 342 indicating the determined position to the processor 320 .
- the internal clock 350 enables to add time data or position confidence data 352 to the trust data 342 .
- the time data indicates a time, the position of the apparatus 300 was determined by the position determiner 340 at last, or the position confidence data indicates a confidence level of the determined position based on the time data.
- the processor 320 generates encrypted image data 322 by encrypting at least the trust data 342 , 352 or characteristic data derivable from at least the trust data 342 , 352 , so that an authentication of that image data 312 is enabled based on the encrypted image data 322 .
- the output unit 340 provides trusted image data 332 comprising the encrypted image data 322 .
- the apparatus 300 may add geographic information of the position of the apparatus 300 at the time an image is taken or a last-known position of the apparatus 100 to the trust data 114 . In this way, it may be verified that the apparatus 100 was in the proximity of the three-dimensional scene of the image to be taken at the time the image was taken. Therefore, the trustworthiness or reliability of the authentication of the image can be improved.
- the apparatus 300 may comprise one or more additional or optional features corresponding to one or more aspects mentioned in connection with the concept or an embodiment described above.
- FIG. 4 shows a block diagram of an apparatus 400 for generating trusted image data 432 according to an embodiment.
- the apparatus 400 comprises an image data generator 410 , a processor 420 , an input unit 430 , a receiver 470 and an internal clock 450 .
- the image data generator 410 and the internal clock 450 are connected to the processor 420 .
- the receiver 470 is connected to the internal clock 450 and the processor 420 is connected to the output unit 430 .
- the image data generator 410 generates image data 412 of an image to be taken from a scene (e.g. two-dimensional or three-dimensional scene).
- the internal clock 450 provides trust data 452 representing time data indicating a time, the image is taken.
- the receiver 470 receives a clock synchronization signal 472 from an external clock.
- the internal clock 450 is synchronized with the external clock based on the clock synchronization signal 472 .
- the internal clock enables to add synchronization data or time confidence data 454 to the trust data 452 .
- the synchronization data indicates a time, the time of the internal clock was synchronized at last, or the time confidence data 454 indicates a confidence level of the time data based on the synchronization data.
- the processor 420 generates encrypted image data 422 by encrypting at least the trust data 452 or characteristic data derivable from at least the trust data 452 , so that an authentication of the image data is enabled based on the encrypted image data 422 .
- the output unit 430 provides trusted image data 432 comprising the encrypted image data 422 .
- the apparatus 400 may comprise one or more optional or additional features corresponding to one or more aspects of the described concept or embodiments described above.
- FIG. 5 shows a block diagram of an apparatus 500 for an authentication of an image according to an embodiment.
- the apparatus 500 comprises an input unit 510 , processor 520 and a comparison unit 530 .
- the input unit 510 is connected to the processor 520 and the comparison unit 530 .
- the processor 520 is connected to the comparison unit 530 .
- the input unit 510 receives image data 502 of an image to be authenticated, current trust data 504 of the image to be authenticated and encrypted image data 506 .
- the current trust data 504 comprises a depth information of at least one pixel of the image to be authenticated or comprises data capable of being used to calculate a depth information of at least one pixel of the image to be authenticated or comprises characteristic data derived from at least a depth information of at least one pixel of the image to be authenticated or derived from data capable of being used to calculate a depth information of at least one pixel of the image to be authenticated.
- the processor 520 decrypts the encrypted image data 506 to obtain image data 522 of the image to be authenticated generated at the time it was taken, original trust data of the image to be authenticated generated at the time it was taken or characteristic data derived from the image data of the image to be authenticated generated at the time it was taken and original trust data of the image to be authenticated generated at the time it was taken.
- the original trust data comprises the depth information of at least one pixel of the image to be authenticated generated at the time it was taken or comprises data capable of being used to calculate a depth information of at least one pixel of the image to be authenticated generated at the time it was taken.
- the comparison unit 540 compares the image data 502 of the image to be authenticated with the image data of the encrypted image, the current trust data 504 with the original trust data 504 or the characteristic data contained by the current trust data with the encrypted characteristic data, so that an alteration of the image data 502 of the image to be authenticated is detectable.
- the apparatus 500 is able to identify manipulations or alterations of the image data of an image to be authenticated. For example, images taken from a two-dimensional printout of a three-dimensional scene can be distinguished from images taken from the three-dimensional scene itself due to the depth information.
- the digital signature (e.g. image data, trust data and/or characteristic data) may be authenticated or verified (e.g. by using the public key of the camera).
- apparatus 500 may comprise one or more additional optional features corresponding to one or more aspects mentioned in connection with the proposed concept or an embodiment described above.
- Some embodiments relate to a trusted 2D/3D evidence camera with integrated image-fake protection.
- a camera may be able to take and save 2D (and optionally 3D) images with an apparatus which technically ensures the authenticity of the recorded scenery.
- it may not only be ensured that the 2D image has not been manipulated after recording, but additionally—by providing the additional 3D information (depth information)—it may be ensured that the taken 2D image is not faked by photographing a printed (and manipulated) image of the 2D scene instead of the actual real 3D scene.
- the saved 3D information can be used to provide information about the absolute distance and/or size of objects.
- the proposed concept is not limited to 2D imaging only. Therefore, it can provide that a 2D image of a scene was taken and not manipulated and not be faked. For example, with good quality printout and lighting a 2D image of a scene can be manipulated, then printed and then again photographed with a 2D evidence camera (in principle, shooting this fake photo may be also possibly at the defined GPS position), but not with the proposed concept. With the additional 3D information (depth information) of the proposed concept, this issue can be avoided and it additionally may deliver more precise 3D distance information of the scene.
- FIG. 2 depicts an example of main components of a proposed evidence-camera system.
- the system may comprise a 2D imager, a real-time clock, an optional GPS receiver and a microcontroller (processor) including some implementation of an asymmetric encryption unit.
- the digital encryption/signature may be correspondingly implemented.
- a private key may be (e.g. once) generated in the camera, the public key can be exported to a PC, for example, in order to decrypt/verify the image and/or meta-data.
- the keys could be stored in a write-only memory in order to be manipulation free. From then, all images and/or meta-data may be encrypted and/or signed with the same unique private key, for example. If necessary, for high security the key could be hardware protected against readout with high security circuits or chips.
- the evidence camera system includes 3D image-data which may add absolute depth information exactly corresponding to the 2D image, for example.
- 3D image-data may be by using a Time-of-Flight (ToF) camera system, but not necessarily (e.g. could also be other related 3D imaging systems).
- the 3D system may be able to provide data (or meta-data) in order to re-compute the absolute depth information of the 2D image pixels. Not just a grey scale image of the relative depth information per pixel may be stored, for example. Therefore, in the case of a ToF camera, the used modulation and/or calibration parameters may be stored in the meta-data in order to compute the absolute depth of the pixels (or in the case of a stereo camera, e.g. focus and/or lens settings may be stored).
- the proposed concept may implement a ToF 3D imaging device.
- An additional feature of a proposed system may be the combination of an internal real-time clock (RTC) and external precise time calibration receivers and/or the computation of the corresponding meta-data which may describe the confidence level of the saved time stamp (e.g. confidence and/or precision level, if the resynchronization was long ago, so in order to be as exact as possible, this parameter can be added, for example).
- RTC real-time clock
- the user may not be allowed to set the time manually. Additionally, a similar confidence level can be saved for the “optional” GPS coordinate data.
- a 3D information can be added to 2D evidence cameras in order to avoid a situation depicted in FIG. 6 .
- a 2D evidence camera With a 2D evidence camera a 2D fake of a manipulated and printed 2D image of a previously photographed scene may not be detected.
- a 3D evidence camera by adding depth information to the trust data
- a 2D fake can be detected due to precise depth information of an image.
- the 3D information may not only be useful for fake protection, but provides additional depth and/or size information of the photographed scene.
- a reconstruction or computation of such depth information from 2D pictures after the event may be impossible or may require high effort, also if the sizes of different objects are known.
- the presented fake detection may be possible with a proposed camera.
- the proposed concept can be used independently of the 3D imaging principle, e.g. ToF or other alternatives may be used.
- the depth information may be provided directly per pixel correlated to the 2D pixels without the need for complex computing algorithms or computing power, for example.
- FIG. 7 shows a flowchart of a method 700 for generating trusted image data according to an embodiment.
- the method 700 comprises generating 710 image data of an image to be taken of a three-dimensional scene and trust data of the three-dimensional scene.
- the trust data indicates a depth information of at least one pixel of the image to be taken or comprises data capable of being used to calculate the depth information of at least one pixel of the image to be taken.
- the method 700 comprises generating 720 encrypted image data by encrypting at least the trust data or characteristic data derivable from at least the trust data, so that an authentication of the image data is enabled based on the encrypted image data.
- the method 700 comprises providing 730 trusted image data comprising the encrypted image data.
- the method 700 may comprise one or more optional steps corresponding to one or more aspects mentioned in connection with the concept or an embodiment described above.
- Some embodiments relate to a method for an authentication of an image according to an embodiment.
- the method comprises receiving image data of an image to be authenticated, current trust data of the image to be authenticated and encrypted image data.
- the current trust data comprises a depth information of at least one pixel of the image to be authenticated or comprises data capable of being used to calculate a depth information of at least one pixel of the image to be authenticated or comprises characteristic data derived from at least a depth information of at least one pixel of the image to be authenticated or derived from data capable of being used to calculate a depth information of at least one pixel of the image to be authenticated.
- the method comprises decrypting the encrypted image data to obtain image data of the image to be authenticated generated at the time it was taken, original trust data of the image to be authenticated generated at the time it was taken or characteristic data derived from the image data of the image to be authenticated generated at the time it was taken and original trust data of the image to be authenticated generated at the time it was taken.
- the original trust data comprises the depth information of at least one pixel of the image to be authenticated generated at the time it was taken or comprises data capable of being used to calculate a depth information of at least one pixel of the image to be authenticated generated at the time it was taken.
- the method comprises comparing the image data of the image to be authenticated with the image data of the encrypted image, the current trust data with the original trust data or the characteristic data contained by the current trust data with the encrypted characteristic data, so that an alteration of the image data of the image to be authenticated is detectable.
- the method may comprise one or more optional steps corresponding to one or more aspects mentioned in connection with the concept or an embodiment described above.
- Embodiments may further provide a computer program having a program code for performing one of the above methods, when the computer program is executed on a computer or processor.
- a person of skill in the art would readily recognize that steps of various above-described methods may be performed by programmed computers.
- some embodiments are also intended to cover program storage devices, e.g., digital data storage media, which are machine or computer readable and encode machine-executable or computer-executable programs of instructions, wherein the instructions perform some or all of the acts of the above-described methods.
- the program storage devices may be, e.g., digital memories, magnetic storage media such as magnetic disks and magnetic tapes, hard drives, or optically readable digital data storage media.
- the embodiments are also intended to cover computers programmed to perform the acts of the above-described methods or (field) programmable logic arrays ((F)PLAs) or (field) programmable gate arrays ((F)PGAs), programmed to perform the acts of the above-described methods.
- Functional blocks denoted as “means for . . . ” shall be understood as functional blocks comprising circuitry that is configured to perform a certain function, respectively.
- a “means for s.th.” may as well be understood as a “means configured to or suited for s.th.”.
- a means configured to perform a certain function does, hence, not imply that such means necessarily is performing the function (at a given time instant).
- any functional blocks labeled as “means”, “means for providing a sensor signal”, “means for generating a transmit signal.”, etc. may be provided through the use of dedicated hardware, such as “a signal provider”, “a signal processing unit”, “a processor”, “a controller”, etc. as well as hardware capable of executing software in association with appropriate software.
- any entity described herein as “means”, may correspond to or be implemented as “one or more modules”, “one or more devices”, “one or more units”, etc.
- the functions may be provided by a single dedicated processor, by a single shared processor, or by a plurality of individual processors, some of which may be shared.
- processor or “controller” should not be construed to refer exclusively to hardware capable of executing software, and may implicitly include, without limitation, digital signal processor (DSP) hardware, network processor, application specific integrated circuit (ASIC), field programmable gate array (FPGA), read only memory (ROM) for storing software, random access memory (RAM), and non-volatile storage.
- DSP digital signal processor
- ASIC application specific integrated circuit
- FPGA field programmable gate array
- ROM read only memory
- RAM random access memory
- non-volatile storage non-volatile storage.
- Other hardware conventional and/or custom, may also be included.
- any block diagrams herein represent conceptual views of illustrative circuitry embodying the principles of the disclosure.
- any flow charts, flow diagrams, state transition diagrams, pseudo code, and the like represent various processes which may be substantially represented in computer readable medium and so executed by a computer or processor, whether or not such computer or processor is explicitly shown.
- each claim may stand on its own as a separate embodiment. While each claim may stand on its own as a separate embodiment, it is to be noted that—although a dependent claim may refer in the claims to a specific combination with one or more other claims—other embodiments may also include a combination of the dependent claim with the subject matter of each other dependent claim. Such combinations are proposed herein unless it is stated that a specific combination is not intended. Furthermore, it is intended to include also features of a claim to any other independent claim even if this claim is not directly made dependent to the independent claim.
- a single act may include or may be broken into multiple sub acts. Such sub acts may be included and part of the disclosure of this single act unless explicitly excluded.
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Testing, Inspecting, Measuring Of Stereoscopic Televisions And Televisions (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (16)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/865,362 US10848642B2 (en) | 2013-04-18 | 2013-04-18 | Apparatus for generating trusted image data, an apparatus for authentication of an image and a method for generating trusted image data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/865,362 US10848642B2 (en) | 2013-04-18 | 2013-04-18 | Apparatus for generating trusted image data, an apparatus for authentication of an image and a method for generating trusted image data |
Publications (2)
Publication Number | Publication Date |
---|---|
US20140314235A1 US20140314235A1 (en) | 2014-10-23 |
US10848642B2 true US10848642B2 (en) | 2020-11-24 |
Family
ID=51729006
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/865,362 Expired - Fee Related US10848642B2 (en) | 2013-04-18 | 2013-04-18 | Apparatus for generating trusted image data, an apparatus for authentication of an image and a method for generating trusted image data |
Country Status (1)
Country | Link |
---|---|
US (1) | US10848642B2 (en) |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10579833B1 (en) * | 2014-12-16 | 2020-03-03 | Thales Esecurity, Inc. | Tamper detection circuit assemblies and related manufacturing processes |
US10630483B2 (en) | 2017-10-23 | 2020-04-21 | Legitipix, LLC | Anonymous image/video digital signature insertion and authentication |
TWI680682B (en) * | 2017-12-20 | 2019-12-21 | 財團法人工業技術研究院 | Methods for determining the position of mobile nodes and related communication systems, road side units and vehicles thereof |
DE102018115233B3 (en) | 2018-06-25 | 2019-07-18 | Sick Ag | Method for the secure transmission of image data and a safe optoelectronic sensor |
JP7163656B2 (en) * | 2018-07-30 | 2022-11-01 | 株式会社リコー | Delivery system, receiving client terminal, delivery method |
CN109905563B (en) * | 2019-03-06 | 2020-02-07 | 首都师范大学 | Stereo image encryption method and device |
IT202100007679A1 (en) * | 2021-03-29 | 2022-09-29 | Beatcode S R L | METHOD FOR CERTIFYING DIGITAL FILES USING AN ELECTRONIC COMMUNICATION DEVICE |
WO2022225977A1 (en) * | 2021-04-19 | 2022-10-27 | Looking Glass Factory, Inc. | System and method for displaying a three-dimensional image |
CN115065762B (en) * | 2022-06-13 | 2023-10-10 | 四川大学 | A 3D image encryption method based on computational ghost imaging |
FR3139216B1 (en) * | 2022-08-29 | 2024-10-18 | St Microelectronics Rousset | Method for generating an update file and corresponding server device, update method and corresponding client device, update method and corresponding system. |
CN117576425B (en) * | 2024-01-17 | 2024-04-16 | 南京掌控网络科技有限公司 | Method and system for detecting scurrying image |
Citations (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5862217A (en) * | 1996-03-28 | 1999-01-19 | Fotonation, Inc. | Method and apparatus for in-camera encryption |
US5901252A (en) * | 1991-12-11 | 1999-05-04 | Fujitsu Limited | Process and apparatus for extracting and recognizing figure elements using division into receptive fields, polar transformation, application of one-dimensional filter, and correlation between plurality of images |
US6425081B1 (en) * | 1997-08-20 | 2002-07-23 | Canon Kabushiki Kaisha | Electronic watermark system electronic information distribution system and image filing apparatus |
US6757828B1 (en) * | 2000-07-27 | 2004-06-29 | Jonathan E. Jaffe | Indigenous authentication for sensor-recorders and other information capture devices |
US20040264542A1 (en) * | 2002-03-13 | 2004-12-30 | Raytek, Inc. | Radiometer with digital imaging system |
US6968058B1 (en) | 1998-04-20 | 2005-11-22 | Olympus Optical Co., Ltd. | Digital evidential camera system for generating alteration detection data using built-in encryption key |
US20060013473A1 (en) * | 1997-04-15 | 2006-01-19 | Vulcan Patents Llc | Data processing system and method |
US20070226509A1 (en) * | 2006-03-15 | 2007-09-27 | Omron Corporation | Authentication device, authentication method, authentication program and computer readable recording medium |
US20070300074A1 (en) | 2006-06-27 | 2007-12-27 | Bellsouth Intellectual Property Corporation | Trusted evidence cameras and related methods and computer program products |
US7436440B2 (en) * | 2002-09-24 | 2008-10-14 | Canon Kabushiki Kaisha | Image processing apparatus and method for describing recorded attribute information using tags, and program for implementing the method |
US20090254530A1 (en) * | 2000-07-27 | 2009-10-08 | Jaffe Jonathan E | Indigenous authentication and searching system and method |
US7774605B2 (en) | 1998-11-17 | 2010-08-10 | Ricoh Company, Ltd. | Digital measurement apparatus and image measurement apparatus |
US20100202436A1 (en) * | 2005-04-22 | 2010-08-12 | Axiometric, Llc | Timing Synchronization in Wireless Mesh Networks |
US20100296441A1 (en) * | 2006-02-22 | 2010-11-25 | Elad Barkan | Wireless internet system and method |
US20130262536A1 (en) * | 2012-03-30 | 2013-10-03 | Intel Corporation | Techniques for intelligent media show across multiple devices |
US20130307932A1 (en) * | 2012-05-21 | 2013-11-21 | Xerox Corporation | 3d imaging using structured light for accurate vehicle occupancy detection |
US20140029797A1 (en) * | 2011-03-28 | 2014-01-30 | Delaval Holding Ab | Method for locating animal teats |
US9245344B2 (en) * | 2012-05-10 | 2016-01-26 | Samsung Electronics Co., Ltd. | Method and apparatus for acquiring geometry of specular object based on depth sensor |
-
2013
- 2013-04-18 US US13/865,362 patent/US10848642B2/en not_active Expired - Fee Related
Patent Citations (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5901252A (en) * | 1991-12-11 | 1999-05-04 | Fujitsu Limited | Process and apparatus for extracting and recognizing figure elements using division into receptive fields, polar transformation, application of one-dimensional filter, and correlation between plurality of images |
US5862217A (en) * | 1996-03-28 | 1999-01-19 | Fotonation, Inc. | Method and apparatus for in-camera encryption |
US20060013473A1 (en) * | 1997-04-15 | 2006-01-19 | Vulcan Patents Llc | Data processing system and method |
US6425081B1 (en) * | 1997-08-20 | 2002-07-23 | Canon Kabushiki Kaisha | Electronic watermark system electronic information distribution system and image filing apparatus |
US6968058B1 (en) | 1998-04-20 | 2005-11-22 | Olympus Optical Co., Ltd. | Digital evidential camera system for generating alteration detection data using built-in encryption key |
US7774605B2 (en) | 1998-11-17 | 2010-08-10 | Ricoh Company, Ltd. | Digital measurement apparatus and image measurement apparatus |
US20090254530A1 (en) * | 2000-07-27 | 2009-10-08 | Jaffe Jonathan E | Indigenous authentication and searching system and method |
US6757828B1 (en) * | 2000-07-27 | 2004-06-29 | Jonathan E. Jaffe | Indigenous authentication for sensor-recorders and other information capture devices |
US20040264542A1 (en) * | 2002-03-13 | 2004-12-30 | Raytek, Inc. | Radiometer with digital imaging system |
US7436440B2 (en) * | 2002-09-24 | 2008-10-14 | Canon Kabushiki Kaisha | Image processing apparatus and method for describing recorded attribute information using tags, and program for implementing the method |
US20100202436A1 (en) * | 2005-04-22 | 2010-08-12 | Axiometric, Llc | Timing Synchronization in Wireless Mesh Networks |
US20100296441A1 (en) * | 2006-02-22 | 2010-11-25 | Elad Barkan | Wireless internet system and method |
US20070226509A1 (en) * | 2006-03-15 | 2007-09-27 | Omron Corporation | Authentication device, authentication method, authentication program and computer readable recording medium |
US20070300074A1 (en) | 2006-06-27 | 2007-12-27 | Bellsouth Intellectual Property Corporation | Trusted evidence cameras and related methods and computer program products |
US20140029797A1 (en) * | 2011-03-28 | 2014-01-30 | Delaval Holding Ab | Method for locating animal teats |
US20130262536A1 (en) * | 2012-03-30 | 2013-10-03 | Intel Corporation | Techniques for intelligent media show across multiple devices |
US9245344B2 (en) * | 2012-05-10 | 2016-01-26 | Samsung Electronics Co., Ltd. | Method and apparatus for acquiring geometry of specular object based on depth sensor |
US20130307932A1 (en) * | 2012-05-21 | 2013-11-21 | Xerox Corporation | 3d imaging using structured light for accurate vehicle occupancy detection |
Non-Patent Citations (7)
Title |
---|
Ben Gribaudo, "Canon EOS Utility-Automatic Camera Clock Synchronization", URL: (http://www.bengribaudo.com/blog/2011/03/17/874/canon-eos-utility-automatic-camera-clock-synchronization), dated prior to Feb. 16, 2012, pp. 1-3. * |
Ben Gribaudo, "Canon EOS Utility—Automatic Camera Clock Synchronization", URL: (http://www.bengribaudo.com/blog/2011/03/17/874/canon-eos-utility-automatic-camera-clock-synchronization), dated prior to Feb. 16, 2012, pp. 1-3. * |
EAS-Unfa1lkamera, EAS-Surveillance GmbH, Berlin, Germany, translated by Google Translate on Apr. 18, 2013. |
Friedman, Gary L. , The Trustworthy Digital Camera: Restoring Credibility to the Photographic Image, last revised Nov. 30, 1994, pp. 1-7. |
Wikipedia, Kinect, en.wikipedia.org/wiki/Kinect as available on Apr. 9, 2013, pp. 1-12. |
Wikipedia, Structured-Light 3D Scanner, en.wikipedia.org/Structured-light_3D_scanner, as available on Apr. 9, 2013, 10 pages. |
Wikipedia, Time-of-flight-camera, en.wikipedia.org/wiki/Time-of-flight_camera, as available on Apr. 9, 2013, 6 pages. |
Also Published As
Publication number | Publication date |
---|---|
US20140314235A1 (en) | 2014-10-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10848642B2 (en) | Apparatus for generating trusted image data, an apparatus for authentication of an image and a method for generating trusted image data | |
CN108764052B (en) | Image processing method, apparatus, computer-readable storage medium and electronic device | |
CN108668078B (en) | Image processing method, image processing device, computer-readable storage medium and electronic equipment | |
CN108805024B (en) | Image processing method, apparatus, computer-readable storage medium and electronic device | |
US10019773B2 (en) | Authentication and validation of smartphone imagery | |
US7512398B2 (en) | Authenticating data units of a mobile communications device | |
CN110248111B (en) | Method and device for controlling shooting, electronic equipment and computer-readable storage medium | |
US7979698B2 (en) | Apparatus and method for proving authenticity with personal characteristics | |
CN108711054B (en) | Image processing method, image processing device, computer-readable storage medium and electronic equipment | |
EP3627812B1 (en) | Video recording apparatus and video recording verification system, and video recording method and video verification method | |
WO2020255575A1 (en) | Encryption key generation device and encryption key generation method | |
CN109495733B (en) | Three-dimensional image reconstruction method, device and non-transitory computer readable storage medium thereof | |
US20200272748A1 (en) | Methods and apparatus for validating media content | |
CN108769665B (en) | Data transmission method and device, electronic equipment and computer readable storage medium | |
CN108830141A (en) | Image processing method, device, computer-readable storage medium, and electronic device | |
US10389536B2 (en) | Imaging systems with data encryption and embedding capabalities | |
CN105847729B (en) | Beidou web camera with preservation of evidence function | |
CN108712400B (en) | Data transmission method, apparatus, computer-readable storage medium and electronic device | |
US12229849B2 (en) | Avatar identity protection using steganography | |
EP4158585B1 (en) | Panorama generation with mobile camera | |
CN117892323A (en) | AR data processing method and device based on blockchain technology and electronic equipment | |
EP3718300B1 (en) | Digital ledger camera and image functions | |
JP2016103775A (en) | Camera device, authentication system, information processing method, and program | |
JP2013038540A (en) | Video recording method, integrity determining method, video recording apparatus, integrity determining apparatus, and program | |
CN108881712B (en) | Image processing method, image processing device, computer-readable storage medium and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INFINEON TECHNOLOGIES AG, GERMANY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MATISCHEK, RAINER;REEL/FRAME:030325/0254 Effective date: 20130410 |
|
STCV | Information on status: appeal procedure |
Free format text: ON APPEAL -- AWAITING DECISION BY THE BOARD OF APPEALS |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
ZAAA | Notice of allowance and fees due |
Free format text: ORIGINAL CODE: NOA |
|
ZAAB | Notice of allowance mailed |
Free format text: ORIGINAL CODE: MN/=. |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20241124 |